A privacy protection method and system for friend matching based on mobile social network second-degree contacts
A mobile social network, privacy protection system technology, applied in the computer field, can solve problems such as limited application scope, difficulty in finding friends with common characteristics, and unstable circle of friends
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0073] The method of the present invention includes three stages: the first stage, the negotiating stage of the mandatory attribute key; the second stage, the decryption stage of the optional attribute; the third stage, the vector similarity calculation stage. The security basis of this method is based on the Chinese remainder theorem and the large prime encryption security framework recognized by cryptography.
[0074] Alice, the dating initiator: has all the rights to set files that match the property settings.
[0075] Friend requester Bob, Tom: Only when the required attributes and location information of the friend requester meet the requirements of the configuration file set by Alice can the correct decryption key be calculated, and then the file can be decrypted to carry out further social activities.
[0076] The first phase, mandatory attribute key negotiation phase
[0077] At this stage, Alice first starts the App application installed on the smartphone, and sets t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


